Tip & How-To about Computers & Internet

WAYS COMPUTER VIRUSES ARE SPREAD

There are different ways in which a virus can spread from computer to computer, but let's take a look at the most frequent ways in which people run into viruses, spy ware and Trojans via the Internet.

Adult Websites: adult websites, gambling websites and other less than trustworthy websites will attempt to automatically access your computer when you visit them. They often install adware bugs that will cause a flurry of pop ups to appear on your screen. This adware will often allow for other programs with even more nefarious purposes to be installed and before you know it, your computer will be swamped. To stop these rogue websites, adjust the settings on your antivirus software and firewall so that no outside connections can be made and no programs can be installed without your express permission.

Email attachments:It has been discovered that since the advent of email attachment by Microsoft's Outlook Express.it is been used as medium by which viruses can be transferred from user to user. It is advised that if you don't know what an attachment is, don't open it. simply use common sense when opening attachments in your email.

Boot disk Infected
:a virus can still be spread if an infected disk is in your hard drive and you attempt to restart. When you start your computer, your machine will always check your drives to see if a disk with boot information is present. If one is, your computer will likely automatically attempt to boot from the disk and not from your drive. If a virus is present in the boot disk, it will often be activated and you will become infected. Always know the origin of any disk you put into your drive.
Local Area Networks. If your computer is connected to a home network or if your work computer is part of a larger network, you may find yourself with an infection through no fault of your own. Someone else on the network downloaded a bug by accident, and within minutes, the entire network could be infected. There isn't much you can do to stop these kinds of infections, short of having your network administrator ensure that everyone's antivirus software is up to date so that the invading bug can be removed as quickly as possible.
Softwares. Downloading files or softwares from the internet can create an access to virus infection on you pc. The key here is to only download freeware or shareware from a trusted source like CNet that always ensures your safety.
Phishing : A phishing scheme starts when you receive an email from a website claiming to be your bank or credit card company, people end up with their identity stolen and a computer fill of viruses. Often times, when you visit these sites, spyware, adware and viruses are automatically installed on your computer The smartest thing you can do is to simply call your bank or credit card company if you receive an email saying there is a problem with your account instead of blindly following links in your email.

Chatting Messagers:
These programs are often targets of hackers who see an easy way to trick people into clicking links that lead them to rogue websites. Common sense can keep you out of trouble, however. Only chat with people you know and never follow links to sites that you don't recognize. You should easily be able to keep Internet worms, viruses and other bugs at bay
Hackers. Today, people understand the value of good online protection, but hackers can still pose a problem if you allow your protection software to lapse. The best way to beat hackers is to ensure that you have a firewall and up to date antivirus software.
External Mobile Devices. There really is no way to stop such an infection from happening, since we all buy peripherals that work with our computer, but we can ensure that we have the tools ready to go if an infection should happen. Keep your anti virus software up to date at all times and you should be able to wrestle control back from any Internet bug.


Fake Anti Virus Software.
This is one of the most frustrating ways to become infected with a virus or worm. There are dozens of anti virus and anti spyware programs you can download for free on the Internet and a surprising number of them actually do exactly the opposite of what they claim. The product websites make outrageous claims that their product can protect you from a whole range of threats, when, in reality, their product will only make things a thousand times worse. Only download antivirus programs from trusted sites or from websites that you know are completely legit.

When we know how spread, we can put an end to their reign of terror online. It is only with the right knowledge that Internet users everywhere can beat online bugs for good.

Posted by on

Computers & Internet Logo

Related Topics:

Related Questions:

1 Answer

kinds of computer virus


from your question, what are the kinds of computer viruses, here is the detailed explanation:

Computermag-glass_10x10.gif viruses are generally defined as a program inputted into a computer that allows replication of the program installed. As it replicates, the program intentionally infects the computer, typically without even the user knowing about the damage being done. A virus, unlike worms or Trojan horses, needs an aid to transfer them to computers. Viruses usually take a large amount of computer memory, resulting into system crashes. Viruses are categorized to several parts based on its features.
Macro Viruses A macro virus, often scripted into common application programs such as Word or Excel, is spread by infecting documents. Macro viruses are known to be platform-independent since the virus itself are written in language of the application and not the messagebox_info.png operating system. When the application is running, this allows the macro virus to spread amongst the operating systemsmag-glass_10x10.gif. There are thousands of macro viruses that exists, and each are considered major threats. Examples of these viruses are: Melissa.A and Bablas. pc.
Network Viruses Network viruses rapidly spreads through a Local Network Area ( messagebox_info.png LAN), and sometimes throughout the internet. Generally, network viruses multiply through shared resources, i.e., shared drives and folders. When the virus infects a computer, it searches through the network to attack its new potential prey. When the virus finishes infecting that computer, it moves on to the next and the cycle repeats itself. The most dangerous network viruses are Nimda and SQLSlammer.
Logic Bombs The messagebox_info.png logic bomb virus is a piece of code that are inputted into a software system. When a certain and specific condition is met, such as clicking on an internet browser or opening a particular file, the logic bomb virus is set off. Many programmers set the malicious virus off during days such as April Fools Day or Friday the 13th. When the virus is activated, then various activities will take place. For example, files are permanently deleted.
Companion Viruses Companion viruses takes advantage of MS- messagebox_info.png DOS. This virus creates a new file with typically the messagebox_info.png .COM extensions, but sometimes the .EXD extension as well. When a user manually types in a program they desire without adding .EXE or any other specific extention, DOS will make the assumption that the user want the file with the extension that comes first in alphabetical order, and thus running the virus. The companion virus is rare among Windows XP computers as this particular operating system does not use the MS-DOS.
Boot Sector Viruses messagebox_info.png Boot sector viruses generally hide in the boot sector, either in the bootable disk or the messagebox_info.png hard drive. Unlike most viruses, this virus does not harm the files in the hard disk, but harm the hard disk itself. Boot sector viruses are uncommon at this day and age because these viruses are spread rapidly by floppy disks and not on CD-ROMs.
Multipartite Viruses Multipartite viruses are spreaded through infected media and usually hides in the memory. Gradually, the virus moves to the boot sector of the hard drive and infects executable files on the hard drive and later across the computer system

Oct 04, 2010 | Computers & Internet

1 Answer

zlob and virtumonde


The Virtumonde or Vundo Trojan is a Trojan Horse Virus that is one of the most popular and deadly viruses infecting computers these days. It is a widely-spread trojan that shows a large amount of unsolicited pop-up advertisements and also silently downloads harmful files from the internet.

The virus is responsible for decreasing the amount of virtual memory available on your computer and it can considerably slow down the performance of your PC. That is not to mention all the other dangerous forms of activity it can spread across your Computer, such as installing more viruses adware, malware, spyware, and also Stealing private information such as passwords and credit card numbers.

Now If you are looking for a way to completely remove the Virtumonde virus from your computer then you've come to the right place. This page is dedicated to help you remove the virtumonde virus. It will run you through exactly what a Vundo Trojan is, where it comes from, how it effects your computer and how to completely remove it from your computer for good

Jul 15, 2009 | Computers & Internet

2 Answers

Can a virus spread if opened in a virtual PC? like VMware?...


No it won't , that is why it's called Virtual Machine.

I use virtual machine, and i've never had that a virus spreads from it to the rest of my pc

Go for it

Please rate this level of service

Thank you

Regards

Jun 05, 2009 | Microsoft Windows XP Home Edition

Not finding what you are looking for?

412 people viewed this tip

Ask a Question

Usually answered in minutes!

Top Computers & Internet Experts

Doctor PC
Doctor PC

Level 3 Expert

7733 Answers

kakima

Level 3 Expert

102366 Answers

David Payne
David Payne

Level 3 Expert

14161 Answers

Are you a Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Loading...